Research Article

Chaotic Image Encryption Algorithm Based on Circulant Operation

Figure 3

Histogram plots: (a) plain-image, (b) cipher-image, (c) histogram of (a), and (d) histogram of (b).
384067.fig.003a
(a)
384067.fig.003b
(b)
384067.fig.003c
(c)
384067.fig.003d
(d)